Sciweavers

393 search results - page 25 / 79
» Implementing Role Based Access Control for Federated Informa...
Sort
View
JCDL
2004
ACM
99views Education» more  JCDL 2004»
14 years 25 days ago
Toward information retrieval web services for digital libraries
Information retrieval (IR) functions serve a critical role in many digital library systems. There are numerous mature IR algorithms that have been implemented and it will be a was...
Yueyu Fu, Javed Mostafa
SIGMOD
1998
ACM
115views Database» more  SIGMOD 1998»
13 years 11 months ago
Providing Database-like Access to the Web Using Queries Based on Textual Similarity
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 1 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
HT
2003
ACM
14 years 20 days ago
Which semantic web?
Through scenarios in the popular press and technical papers in the research literature, the promise of the Semantic Web has raised a number of different expectations. These expect...
Catherine C. Marshall, Frank M. Shipman III
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 11 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...